A public key _____________ is a pervasive system whose services are implemented and delivered using public
key technologies that include Certificate Authority (CA), digital certificates, non-repudiation, and key history
management.
Which of the following types of authentication BEST describes providing a username, password and
undergoing a thumb print scan to access a workstation?
A representative from the human resources department informs a security specialist that an employee has
been terminated. Which of the following would be the BEST action to take?